Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Cybercriminals are preying on existing vulnerabilities to plan future attacks

Cybercriminals are preying on existing vulnerabilities to plan future attacks

2015/07/31

Help Net Security - (International) An analysis of cyber threats by Solutionary identified several campaigns consisting of over 600,000 events worldwide that targeted the bash vulnerability in the second quarter of 2015, and found that the U.S. was a leading source of command and control traffic and malware threats, among other findings.

Source: http://www.net-security.org/secworld.php?id=18691

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:53